Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }

Answers

Answer 1

Answer:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]

Explanation:

Given

The above code segment

Required

The final values of [tex]a,\ b\ \&\ c[/tex]

The following line declares and initializes the values of a, b and c

int a = 1;     int b = 0;     int c = -1;

So, we have:

[tex]a = 1; b =0; c = -1[/tex]

Next, the following if condition is tested

if ((b + 1) == a)

[tex]b + 1 =0 +1[/tex]

[tex]b + 1 = 1[/tex]

And:

[tex]a = 1[/tex]

So,

[tex]b + 1 = a = 1[/tex]

Since the condition is true, the statements in the curly brace { } will be executed;

[tex]b++ \to b = b+1 \to b = 0 + 1 \to b = 1[/tex]

So:

[tex]b = 1[/tex]

[tex]c += b \to c = c+b \to c = -1 + 1 \to c = 0[/tex]

So:

[tex]c = 0[/tex]

Next, the following if condition is tested

c == a

c = 0 and a =1

So:

[tex]c \ne a[/tex]

That means, the statements in its curly brace will not be executed.

So, the final values of a, b and c are:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]


Related Questions

What are your thoughts about this re-designed Logo? Is it good? Or is poorly designed? Explain your answer below.

Answers

Answer:

It is good but the back is not good enough.

why is information called a resource​

Answers

Answer:

Explanation:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

Answer:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

The Dark Web is _____. Select 2 options.

an international marketplace where criminals buy and sell products

an international marketplace for illegal trade only

a capitalistic marketplace for criminals and noncriminals

a network of cybercriminals organized from Europe and the US

a local marketplace to trade intellectual property

Answers

Answer:

a. an international marketplace where criminals buy and sell products.

c. a capitalistic marketplace for criminals and non-criminals.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the world wide web (www) is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The dark web also referred to as darknet, can be defined as a subset of the world wide web that is intentionally encrypted from conventional web browser and search engines. Thus, it is a peer-to-peer network that requires the use of specialized configuration and web browser such as "Tor browser" in order to access its contents.

Generally, all the internet activities carried out on the dark web are anonymous and private, thereby making it suitable for either legal or illegal operations. Also, it's devoid of government influence or control and as such it's typically a capitalistic marketplace, where goods and services are privately owned and controlled by the people.

Hence, we can deduce that the dark web is simply;

I. An international marketplace where criminals buy and sell their products.

II. A capitalistic marketplace for criminals and non-criminals.

Answer:

an international marketplace where criminals buy and sell products

a capitalistic marketplace for criminals and noncriminals

Explanation:

Ed22


2. According to the U.S. Department of Labor Statistics, which field of drafting has the highest median
salary:
a.Architectural
b.Mechanical
c.Electronics
d. Radiological

Answers

it is c it’s always the right answer

Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employee. She had thought their security was airtight! Two recent changes they made were migrating their database to a private, on-premises cloud and installing IoT devices that communicate with the database continually. What most likely occurred

Answers

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

what is a way of telling the computer how to display certain content pls answer quick

Answers

Machine language is the language understood by a computer. It is very difficult to understand, but it is the only thing that the computer can work with. All programs and programming languages eventually generate or run programs in machine language

On the Direct Marketing worksheet, create appropriate range names for Design Fee (cell B8), Cost Per Ad (cell B9), Total Clicks (cell B10), Profit Per Click (B11), and Gross Profit (cell B12).

Answers

Answer:

See explanation below

Explanation:

Named ranges are a very important tool in Microsoft Excel. It is used in assigning a name to a particular number of cells. It is great for automation and makes formula much easy to understand and use.

One way to create named ranges is theory the Name Box.

To create named ranges in the design marketing sheet we do this;

1) We click on cell B8 and then navigate to the name box at the top right corner of the sheet just above the column A.

•The name box is where the cell address of any cell that is active is displayed.

•You would see that “B8” is displayed on the name box.

• Double click on the name box and type in the appropriate name, in this case - Design_Fee.

• Press enter and you have your named range.

You do the same for the other named ranges.

Note that: Named ranges must contain letters, numbers or underscore.

How do I make a game from scratch, what program should I use, and what tutorial should I follow, I want to make a 2D platformer with some 3D elements in there.

Answers

Honestly just buy a decent GUI and gets scripts for other games and piece it together it’s how was made

Description
How many minutes of video would fill an iPhone with 8 GB of
storage, where 3 GB is already used.
One minute of video takes 150 MB of storage.
One GB (gigabytes) is about 1000 MB (megabytes).
Hint: Do all of your calculations in megabytes (MB).

Answers

33.33 minutes of video

3 GB already used which means you have 5 GB left, 5GB is the same as 5000 MB

So 5000 MB divided by 150 MB is 33.33 minutes of video that can be stored on the iPhone

How can learning opportunities for AI be extended to all

Answers

Answer:

Learning opportunities for AI can be extended to all through the inclussion of courses and different teaching methods related to Artificial Intelligence, new technologies, computer science, programming and, in short, everything related to the digital world, in the educational plans at the national level. This is so because artificial intelligence and computer systems are the basis for the development of the new tools jobs of tomorrow. Thus, education in these subjects is essential so that citizens can enter the labor market once they acquire the necessary age, having the knowledge to do so in a proper way.

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines

Answers

Answer:

VoIP gateway

Explanation:

A VoIP stands for the voice over IP. The VoIP gateway is defined as a hardware device which is used to convert the telephony traffic into the packets of data that is used for transmission over the internet. It acts as the bridge and connects the VoIP with the worlds of the legacy telephony.

In a VoIP setup, the signals form the analog phone of the campus equipment  are converted to the IP data which can travel over the analog telephone lines of the phone company.

What is a product line

Answers

Answer:

A group of products that are similar in many ways, but usually spec'd out uniquely to target different applications or customers.

Select the correct answer from each drop-down menu.
What is the purpose of a firewall installed on the web server?
A firewall blocks all- restricted, legal, or illegal-
access to a web server other than those services that are intended for-internal, public, or private-
use.

Answers

Answer:

Illegal and public

Explanation:

waluigi for smash who agrees ​

Answers

Answer:

I do

Explanation:

Well, if i didnt, i wouldn't be part of the internet, now would I?

(can i get brainliest? pls?)

totally i agree-even tho i dont really play anymore

Write the output of the following program:

CLS

a=20

FOR x = 1 to a

IF x MOD 2 < > 0 THEN

S S+x

END IF

NEXT X

PRINT S

END​

Answers

Answer:

Expression A

Explanation:

In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...

1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100

Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or disagree? State your reasons.

Answers

Answer:

Yes, I do agree with the given statement. A further explanation is provided below.

Explanation:

Web design but mostly application development were most widely included throughout an interchangeable basis, though web design seems to be officially a component of the wider website marketing classification.Around to get the appropriate appearance, several applications, as well as technologies or techniques, are being utilized.

Thus the above is the right approach.

Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers

Answers

Answer:

Task A

Explanation:

Hannah's prior status updates, pictures, and profile data will be hidden from view and deleted from servers 30 days after posting.

What amount of time when scaled up large company?

When a set of symbols is used to represent a number, letter, or word during coding, that symbol, letter, or word is said to be being encoded. The collection of symbols is referred to as a code. A set of binary bits is used to represent, store, and transmit digital data.

Binary code is another name for this category.The values of the subject attributes can be stored in numerous rows for large data subjects. Data from long data sets may span several columns.

Therefore, The only system that is adaptable enough to allow for the representation of data other than numbers is the binary number system.

Learn more about scaled up here:

https://brainly.com/question/28966944

#SPJ2

For the situation below, determine whether the premium will likely increase, decrease, or remain the same.

Kamiah passes a driver’s education course.

Answers

Answer:

decrease

Explanation:

Multiple
Choice
What will be the output?
class num:
def __init__(self,a):
self. number = a
def_mul__(self, b)
return self.number + b.number
numA = num(5)
numB = num(10)
product = numA * numb
print(product)
50
O 5
an error statement
15

Answers

Answer:

15

Explanation:

Edge 2021

What is a variable in programming?
1) A symbol or set of characters in a programming statement whose value can
be changed
2) A symbol in a mathematical equation
3) The characters that make up a string
4) The output when code is printed

Answers

A symbol or set of characters in a programming statement whose value can be changed

Cybercriminals operate from Select 3 options . Undeveloped countries , developed countries, Africa and China, mostly Brazil and Russia, anywhere in the world

Answers

Answer:

Undeveloped countries, mostly Brazil and Russia, Africa and China,

Explanation:

Cybercrime is a computer-oriented crime where that involves the network and maybe to threaten, steal data, or any financial matter. As approx. 30% of cyber attacks come from China. While most of the cybercriminals and fraudsters are found in developing countries like Africa, India, and even Russia.

Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.

Answers

Answer:

Good, clean designs depicts the logic link of the company and easy to remember as compared to the bad, cluttered designs

Explanation:

The major difference between the good, clean designs and the bad, cluttered designs is that the good, clean designs depicts the logic link of the company and it is easy to remember such symbols but in case of bad, cluttered designs it is not that easy to find the logic link and also it is difficult to remember the logo.

PLEASE HELP WITH MY COMPUTER
this thing is popped up and it's annoying. I'm on a HP laptop how do i get rid of it?​

Answers

Answer:

Escape or turn it off then back on??

Explanation:

I'm not very sure what is going on but idfk

Which statement best describes the problem statement below?

Vision: We want to decrease errors in our billings to clients.

Issue: Clients complain that they receive multiple bills for the same month. We have one software that keeps track of services made to clients, another software that keeps track of the charges of those services, and another software that bills the clients.

Method: Print out services and charges, and enter these values into a billing software.
This problem statement is a clear, well-defined problem statement.
This problem statement does not clearly define the issues.
This problem statement will help stakeholders participate in addressing the problem.
This problem statement does not provide a useful statement of method.

Answers

Answer:

B

Explanation:

This problem statement does not clearly define the issues.

Answer:

B

Explanation:

true or false: erosion takes very long to happen.​

Answers

the answer is true. erosion takes place over time

Answer:

True

Explanation:

By definition, erosion is the gradual destruction or diminution of something.

1) Erosion can take many forms

2) The 3 main types of erosion are water, wind, and ice

3) The process of erosion can take up to thousands of years

4) Erosion affects humans because it creates dust that pollutes the air and on average carries around 20 different diseases including anthrax and tuberculosis

can some one tell me how to screen shot on a pc computer

Answers

Answer:

click 'prt sc' which is print screen.

and then save it somewhere..like paint or something and DONE.

thenks for the points btw.

Answer:

You just press the (Win+PrtSc) key.

Or sometimes you just have to press the (PrtSc) key

Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at a rate of 48.2 km/h. How long will the note reach Tommys crush?​

Answers

Answer:

0.5 hours or 1800 seconds.

Explanation:

Given the following data;

Distance = 24km

Speed = 48.2 km/h

To find the time;

Time = distance/speed

Time = 24/48.2

Time = 0.50 hours

Converting the time to seconds;

1 hour = 3600 seconds

0.5 hour = 1800 seconds

Therefore, it would take 1800 seconds or 0.5 hours for the note to reach Tommy's crush.

Using the speed - distance relationship, it will take the pigeon about 29.88 minutes to reach Tommy's crush.

Given the Parameters :

Speed of pigeon = 48.2 km/hr

Distance to be covered = 24 km

Recall the Time taken relation :

Time taken = (Distance ÷ Speed)

Time taken = (24 ÷ 48.2) = 0.4979253 hours

Converting to minutes :

0.4979253 × 60 = 29.875 minutes

Therefore, it will take the pigeon about 29.88 minutes to reach her destination.

Learn more : https://brainly.com/question/23313999

Select the correct answer.
What type of media is/are only used for one-time backups?
A.
internal hard disk
B.
external hard disk
C.
DVD, optical media, and removable media
D.
remote shared folder
E.
tape

Answers

Answer:

E

Explanation:

Answer:

It's D I promise

Explanation:

i did it! D is right

Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon ladies rock the party Shake your body everybody

C'mon everybody
Let's move it all night
Gonna take you back to the old school
Can u feel the vibe
Just dance to the rhythm and let me
See ya wind your waistline
Jump back and the do the twist
And the electric slide yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon fellas rock the party Shake your body everybody

Lets get funky do the? sound
And say here we get on the floor and do it like this

Can anyone do the Double Bump?
Like back in the day
We thought we'd bring it to ya
Baha Men keep it groovin' yeah yeah
Well I can see everybody on the floor
Doing the running man
Do the mash potato
Or walk the Philly Dog if you can
Yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon y'all let's rock the party Shake your body everybody

Remember back in the day
When we used to dance the Boogaloo
Everybody used to rock the beat
Solid Gold kickin' up too
And everybody rock together with the DJ when he plays
Smooth music is kickin' clippin'
We rush back and we keep dippin'

C'mon baby let's rock let's rock
We gonna get up on the dance floor and do the Pee wee Herman
So shake it up
And do the bus stop
And do the Robot
And baby do the rock yeah
(Move it man)

Can you move it like this? LA! I can shake it right back
Atlanta!
Can you move it like this? New York! I can shake it right back
Whazzup!
Can you move it like this? Seattle! I can shake it right back
Dallas and Houston!
C'mon y'all let's rock the party Shake your body everybody

Answers

Answer:

okkkkkkkkkkkkk???

Write a program that repeatedly asks the user to type in an integer until they input a multiple of 7

Answers

Answer:

 See the code in the explanation below

Explanation:

For this excersie we are going to be using C++, if you want me to produce the code in another language do let me know

// Online C++ compiler to run C++ program online

#include <iostream>

using namespace std;

int main()

{

int Number;

   do

{

 cout <<"Enter a  multiple of seven: ";

 cin >> Number;

 

 if(Number%7 == 0 ){

     cout<<"correct!!! the number is a multiple of seven";

 

 }

} while(Number%7 != 0);

}

   

   

 

   

   

   

   

       

Other Questions
1What is the radius of a circle with circumference 17 mm? Round to the nearest tenth. Use 3.14 for TT. Which of the following is an equation of a line parallel to the equation y = 1x +1? 2 O A. y = -2x-5 O B. y = 2x-5 2. C. y=-1X-5 C. y=- O D. y = 12 x - 5 if a:b:c is equal to 5:2:3. what is a-2b:3b-c please it is assigment Is the following number rational or irrational? sqrt(50) Choose 1 answer ? What is it called when the governor steals money from the budget to buy a car. He gets caught and goes to prison.Word Bank:Limited GovernmentRepublicanismChecks and BalancesFederalismSeparation of PowersPopular SovereigntyIndividual Rights Which solid figure has the following net?square prismsquare pyramidtriangular pyramidtriangular prismQUICK PLS!! 2x=8.pls help me i really need it Why do most Australians live in an urban environment? Petronio says that ownership and control of private information don't always go together. Can you imagine a situation where you are the sole owner of a secret yet have no control over its disclosure or discovery? Rewrite all three fractions with the lowest common denominator. AcellusD135ABCD = [?]Enter the number that belongs inthe green box.EnterCopyright 2003 - 2021 Acellus Corporation. All Rights Reserved. Summary of the Battle of Chancellorsville Write the slope-intercept form of the line of the equation below.5x+6y=18 Helping a friend is not always good Name: ___________________________ Date: __________ Period: ______ Solubility Rules Practice Worksheet Name or give the chemical formula for each of the following compounds. State whether they are soluble (will dissolve) or insoluble (will not dissolve) in solution. Use solubility rules. Chemical Formula Name Solubility NH4OH Ra(OH)2 Nickel (III) Acetate CsOH RbCl Potassium Phosphate MgS CaI2 Gold (II) Hydroxide Li3PO4 Platinum (II) Carbonate Barium Nitrate gregor Mendel demonstrated that then Heritance of genetic traits determined by Capable Golf Cart, Inc. (CGC) manufactures two models of golf cart: LX and EX. The budget data for next month is available. LX EX Total Units produced 50 30 80 Direct labor hours 2,000 3,000 5,000 Machine hours 1,500 1,200 2,700 Direct materials $125,000 $90,000 $215,000 Direct labor 90,000 60,000 150,000 Manufacturing overhead 202,500 Total $567,500 Required: 1. Compute the reported unit cost for each product if direct labor hours are used as the allocation base. 2. Compute the reported unit cost for each product if direct labor costs are used as the allocation base. 3. Compute the reported unit cost for each product if machine hours are used as the allocation base. find the surface area of the cylinder in terms of pi. a.350pi cm b.896pi cm c.602pi cm d.644pi cm Which ordered pair is in the solution set of 0.5x - 2y 3? Type the correct answer in the box. Spell all words correctly.Which term refers to the legitimare writings that a handwriting expert compares to a suspected forgery?created by the original writer that a handwriting expert compares to a suspected forgery.